Showing results 53861 to 53880 of 62560
Vortex Ring, Shock-Vortex Interaction, and Morphological Transformation Behind a Finite Cone S.M.Chang; Chang, Keun Sick, JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY, v.15, no.11, pp.1599 - 1604, 2001-11 |
Vortex shedding from a circular cylinder near a moving wall Huang, WX; Sung, Hyung Jin, JOURNAL OF FLUIDS AND STRUCTURES, v.23, no.7, pp.1064 - 1076, 2007-10 |
Vortex simulation of leading-edge separation bubble with local forcing Sung, Hyung Jin; Chung, YM; Kiya, M, FLUID DYNAMICS RESEARCH, v.18, pp.99 - 115, 1996 |
VORTEX-INDUCED VIBRATION AND DRAG COEFFICIENTS OF LONG CABLES SUBJECTED TO SHEARED FLOWS Kim, Yang-Hann; VANDIVER, JK; HOLLER, R, JOURNAL OF ENERGY RESOURCES TECHNOLOGY-TRANSACTIONS OF THE ASME, v.108, no.1, pp.77 - 83, 1986-03 |
Vortex-shedding characteristics in the wake of an oscillating airfoil at low Reynolds number Jung, YW; Park, Seung O, JOURNAL OF FLUIDS AND STRUCTURES, v.20, no.3, pp.451 - 464, 2005-04 |
Vortical flow over the free end surface of a finite circular cylinder mounted on a flat plate Roh, SC; Park, Seung O, EXPERIMENTS IN FLUIDS, v.34, no.1, pp.63 - 67, 2003-01 |
Voting fuzzy k-NN to predict protein subcellular localization from normalized amino acid pair compositions Tung, TQ; Lee, Doheon; Kim, DW; Lim, JT, ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE, v.3518, pp.180 - 185, 2005 |
Voting-based separation of diffuse and specular pixels Yoon, Kuk-Jin; Kweon, In-So, ELECTRONICS LETTERS, v.40, pp.1260 - 1261, 2004-09 |
Voxceleb: Large-scale speaker verification in the wild Nagrani, Arsha; Chung, Joon Son; Xie, Weidi; Zisserman, Andrew, COMPUTER SPEECH AND LANGUAGE, v.60, 2020-03 |
Voxel-based haptic rendering using adaptive sampling of a local distance map Kim, Kimin; Park, Jinah, Journal of Computing Science and Engineering, v.13, no.2, pp.66 - 77, 2019-06 |
vPMM: A value based process maturity model Lee, J.; Lee, Danhyung; Kang, Sungwon, STUDIES IN COMPUTATIONAL INTELLIGENCE, v.208, no.0, pp.193 - 202, 2009 |
VPrimer: A Method of Designing and Updating Primer and Probe With High Variant Coverage for RNA Virus Detection Jeon, Hajin; Bae, Jeongmin; Kim, Hyerin; Kim, Min-Soo, IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, v.20, no.1, pp.775 - 784, 2023-01 |
VRSA Net: VR Sickness Assessment considering Exceptional Motion for 360-degree VR Video Kim, Hak Gu; Lim, Heoun-taek; Lee, Sangmin; Ro, Yong Man, IEEE TRANSACTIONS ON IMAGE PROCESSING, v.28, no.4, pp.1646 - 1660, 2019-04 |
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text Jo, Hyeonseong; Lee, Yongjae; Shin, Seungwon, COMPUTERS & SECURITY, v.120, 2022-09 |
Vulnerabilities of network OS and mitigation with state-based permission system Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; Shin, Seungwon; Kang, Brent Byunghoon, SECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09 |
Vulnerability Analysis of Evacuation Transportation Networks Kim, Jun; Lee, Je-Hun; Kim, Hyunjung; Chung, Byung Do, INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING-THEORY APPLICATIONS AND PRACTICE, v.25, no.5, pp.663 - 673, 2018 |
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005 Kwon, Daesung; Han, Daewan; Lee, Jooyoung; Yeom, Yongjin, LECTURE NOTES IN COMPUTER SCIENCE, v.4097, pp.262 - 270, 2006 |
Vulnerability-Based Critical Neurons, Synapses, and Pathways in the Caenorhabditis elegans Connectome Kim, Seongkyun; Kim, Hyoungkyu; Kralik, Jerald D.; Jeong, Jaeseung, PLOS COMPUTATIONAL BIOLOGY, v.12, no.8, 2016-08 |
VUV spectroscopy in impurity injection experiments at KSTAR using prototype ITER VUV spectrometer Seon, C. R.; Hong, Joohwan; Song, Inwoo; Jang, Juhyeok; Lee, H. Y.; An, Y. H.; Kim, B. S.; et al, REVIEW OF SCIENTIFIC INSTRUMENTS, v.88, no.8, pp.083511, 2017-08 |
W 에 의한 Mo 치환이 850℃ 에서 시효된 이상 스테인레스강의 취화 특성에 미치는 영향 김상범; 백경욱; 김영길, 대한금속·재료학회지, v.35, no.12, pp.1593 - 1601, 1997-12 |
Discover